Basel II Compliance with Tripwire

Similar documents
WHITE PAPER. PCI Basics: What it Takes to Be Compliant

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Information Security Policy

Enforcing IT Change Management Policy

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

GUIDANCE FOR MANAGING THIRD-PARTY RISK

Discussion on Network Security & Privacy Liability Exposures and Insurance

A Guide to Keeping Legal: Four Pillars of Compliance. Introduction

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

VENDOR MANAGEMENT. General Overview

OCC 98-3 OCC BULLETIN

Cyber Security - What Would a Breach Really Mean for your Business?

Keeping watch over your best business interests.

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

INTERNATIONAL STANDARD ON AUDITING 250 CONSIDERATION OF LAWS AND REGULATIONS IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

Cyber Risks Connect With Directors and Officers

FINAL NOTICE. (1) imposes on Bank of Beirut (UK) Ltd ( Bank of Beirut ) a financial penalty of 2,100,000; and

Basel Committee on Banking Supervision. Consolidated KYC Risk Management

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

Any business relationship between a bank and another entity, by contract or otherwise

FINAL NOTICE Nationwide has confirmed that it will not be referring the matter to the Financial Services and Markets Tribunal.

Proving Control of the Infrastructure

DeviceLock for SOX Compliance

DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

REGULATION 9 ON OPERATIONAL RISK MANAGEMENT. Article 1 Purpose and Scope

Mitigating and managing cyber risk: ten issues to consider

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Supervisory Guidance on Operational Risk Advanced Measurement Approaches for Regulatory Capital

Information Resources Security Guidelines

Solvency ii: an overview. Lloyd s July 2010

Part A OVERVIEW Introduction Applicability Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

10 Steps to Establishing an Effective Retention Policy

Who s Your Vendor? Secondary Market Compliance and Title Agent Vendor Management

YEARENDED31DECEMBER2013 RISKMANAGEMENTDISCLOSURES

PACB One-Day Cybersecurity Workshop

WHITE PAPER. PCI Compliance: Are UK Businesses Ready?

Privilege Gone Wild: The State of Privileged Account Management in 2015

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

Preparing for the HIPAA Security Rule

Outbound Security and Content Compliance in Today s Enterprise, 2005

EURIBOR - CODE OF OBLIGATIONS OF PANEL BANKS

Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for

Cybercrime: risks, penalties and prevention

Federal Home Loan Bank Membership Version 1.0 March 2013

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

6/8/2016 OVERVIEW. Page 1 of 9

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Vendor Management Compliance Top 10 Things Regulators Expect

Using Continuous Monitoring Information Technology to Meet Regulatory Compliance. Presenter: Lily Shue Director, Sunera Consulting, LLC

CORE Security and GLBA

Credit Union Liability with Third-Party Processors

RISK MANAGEMENT AND COMPLIANCE

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

The Impact of HIPAA and HITECH

MUSINGS ON PROFESSIONAL LIABILITY IMPLICATIONS OF ACOS

Cyber Liability. AlaHA Annual Meeting 2013

Validating Third Party Software Erica M. Torres, CRCM

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Vendor Management Compliance Top 10 Things Regulators Expect

1. promoting an efficient and effective financial system that adequately finances economic growth, and

Select the right configuration management database to establish a platform for effective service management.

White Paper #6. Privacy and Security

The potential legal consequences of a personal data breach

Embracing Cyber Risk: Insurance Solutions

IT Service Management Metrics that Matter. Reason to Improve: Unintended Consequences of Low Performance

Getting Smart About Revenue Recognition and Lease Accounting

Allowance for Loan and Lease Losses

Addressing SOX compliance with XaitPorter. Version 1.0 Sept. 2014

Self-Service SOX Auditing With S3 Control

Security Information Lifecycle

EASY FOREX TRADING LTD DISCLOSURE AND MARKET DISCIPLINE IN ACCORDANCE WITH CAPITAL ADEQUACY AND THE REQUIREMENTS ON RISK MANAGEMENT

D. E. Shaw & Co. (London), LLP Pillar 3 Disclosure

Basel Committee on Banking Supervision. Net Stable Funding Ratio disclosure standards

Best practices for confident plan compliance

FDIC Updates Guidance on Payment Processor Relationships

Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq.

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

AUTOMATED PENETRATION TESTING PRODUCTS

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Top Ten Technology Risks Facing Colleges and Universities

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

INTERAGENCY GUIDANCE ON THE ADVANCED MEASUREMENT APPROACHES FOR OPERATIONAL RISK. Date: June 3, 2011

ZAG BANK BASEL II & III PILLAR 3 DISCLOSURES. December 31, 2014

Consideration of Laws and Regulations in an Audit of Financial Statements

SAME PRINCIPLES APPLY, BUT NEW MANDATES FOR CHANGE

2016 OCR AUDIT E-BOOK

A CSi Solution for Jack Henry Streamline

Massachusetts MA 201 CMR Best Practice Guidance on How to Comply

Cybersecurity and the Threat to Your Company

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Risk Management of Outsourced Technology Services. November 28, 2000

Network Security & Privacy Landscape

Transcription:

WHITE paper page 2 page 2 page 3 page 3 page 4 page 4 page 4 page 5 page 6 page 7 Overview What is Basel II? Three Keys to Information Security Under Basel II Mitigating Operational Risk Tracking and Centralizing Loss Event Data Disclosure Policies, Internal Controls and Assessment Processes Basel II Deadlines and Transition Periods Basel II Requirements and the Role of Change Management How Tripwire Helps Companies Achieve Basel II Compliance Basel II Requirements and Tripwire solutions Other Resources Daniel J. Langin, Attorney at Law LLC 2007 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved.

As if financial institutions did not have enough compliance worries, a new international standard Basel II 1 now looms on the compliance horizon. Unlike other laws and standards affecting financial institutions in the US and overseas such as the Gramm-Leach-Bliley Act ( GLBA ), the EU Data Protection Directive and the PCI Data Security Standard, however, the ramifications of this law extend beyond protection of electronic consumer data. Instead, Basel II focuses on the institution s core functions of evaluating, planning for, and disclosing financial risk. Overview What is Basel II? Basel II is not, strictly speaking, a law or regulation. It is an international banking standard created by the Basel Committee on Banking Supervision, or BCBS. BCBS is an organization made up of central bank and banking regulatory authorities from several European nations, Japan, the UK, and the US, that encourages international cooperation of banking authorities throughout the world and issues guidance on banking supervision. Even though Basel II is not a law or regulation, its terms will ultimately be adopted into legislation or regulation by virtually every nation in the world. In this fashion Basel II will eventually extend to financial institutions worldwide, making it potentially more ubiquitous than any US law or EU Directive. Basel II consists of three pillars, or organizing concepts. These are Minimum Capital Requirements, Supervisory Review, and Market Discipline. The Minimum Capital (Pillar 1) requirements mostly deal with the formulae that financial institutions must use to calculate the minimum capital they need to protect themselves from risk of loss from defaults or other financial losses. The Market Discipline (Pillar 3) requirements mostly deal with procedures to ensure that risky loans and other unwise disposition of assets is avoided. Although Pillars 1 and 3 implicate information security, the requirements that most affect information security appear in the Supervisory Review (Pillar 2) requirements, especially its Operational Risk provisions. Each Pillar includes three approaches to compliance based on increasing levels of sophistication (Basic Indicator Approach, Standardized Approach and Advanced Measurement Approach), and each approach carries its own individual formula for calculating risk and its own Qualifying Criteria (standards the institution must meet to adopt a given approach). As noted above, each nation must adopt its own laws or regulations implementing Basel II. The current state of rulemaking in the US consists of a Supervisory Guidance document and an Advanced Notice of Proposed Rulemaking issued by the Board of Directors of the FDIC. These documents suggest that US regulatory agencies will adopt those aspects of Basel II that are appropriate for use by large and internationally active US banking institutions, 2 and that US rulemaking for Operational Risk will focus on the Advanced Measurement Approach ( AMA ) because it gives institutions the most flexibility in implementing risk management processes. The FDIC has also commented, however, that this AMA-based approach will require institutions to establish a risk management framework that encompasses all aspects of identifying, measuring and controlling operational risk, including board responsibility of development and oversight of the risk framework. So how can companies understand the information security ramifications of Basel II? Given the dizzying number of provisions, the existence of three approaches for each Pillar, and different qualifying criteria for each of these approaches, an institution needs to start its compliance efforts from basic, common compliance criteria. A good starting point is to examine three common keys to information security under Basel II. Three Keys to Information Security Under Basel II Basel II contains over 800 individually numbered paragraphs and is nearly 300 pages long. The core information security challenges posed by the law, however, can be summarized into three key sets of requirements: Mitigating Operational Risk; Tracking and centralizing event loss data, and; Adopting disclosure policies, controls and assessment processes. 1 Formally known as the International Convergence of Capital Measurements and Capital AStandards A Revised Framework. (referred to herein simply as Basel II ). 2 FDIC, Advanced Notice of Proposed Rulemaking Regarding Risk-Based Capital Guidelines: Implementation of New Basel Capital Accord, p. 7 (July 11, 2003). Page 2

Mitigating Operational Risk As noted above, Basel II focuses on reduction of risk that may affect a financial institution s bottom line. One of the categories of risk most addressable by information security measures is Operational Risk, which is defined in Basel II as risk of loss resulting from inadequate or failed internal processes, people and systems or from external events, including legal risk. The term legal risk 3 is further defined in Basel II as exposure to fines, penalties or punitive damages resulting from supervisory actions, as well as private settlements. 4 The definitions of Operational Risk and legal risk are broad enough to encompass the entire realm of compliance, security, and liability risks that financial institutions face from an information security perspective. Inadequate or failed internal processes and systems can include information security processes and systems that are not adequate to prevent an external event such as an exploit or identity theft, that fail to meet regulatory requirements under GLBA or similar laws, or that expose the institution to a risk of a civil lawsuit or regulatory penalties for failing to protect its (or its customers) data. An inadequacy or failure of persons can include failure to monitor employees or vendors for compliance with information security or data use policies or procedures. Institutions can mitigate operational risk under Basel II by applying a number of measures. These include using systems, applications, and processes that detect unauthorized changes or other suspicious activity which may indicate a failure or inadequacy in internal processes, people, and systems, and that can detect and prevent external events such as an exploit or corporate phishing attempt against the institution. Systems, applications, and processes should also be implemented to monitor personnel for failures to comply with security policies and procedures. As noted above, these measures differ from the consumer data protections required by most current laws and regulations because they not only require the institution to protect that data, but also any other data that is proprietary and confidential to the institution (which includes information on any items that, if shared with a competitor, would render a bank s investment in such items less valuable). Examples can include details of product development, marketing, trade secret, M&A, and related business planning. Furthermore, Basel II reinforces the need to implement systems, applications and processes that otherwise help to maintain compliance with other existing regulatory requirements (GLBA, FACT and so forth) to mitigate operational risk from supervisory actions. Tracking and Centralizing Loss Event Data The second key to compliance with Basel II from an information security standpoint is tracking and centralizing internal loss event data. Currently, most institutions may gather and record internal loss event data in a variety of ways using a variety of systems, with little coordination. To support Basel II s goal of centralizing risk management processes to support better risk-based decision making by the institution, Basel II requires the institution to: track all internal loss event data, and adopt specific criteria for assigning loss event data into a centralized function (Basel II refers to the IT department as such a centralized function 5 ) From an information security perspective, institutions need to be able to ensure that event loss data from sources such as spreadsheets, databases, and e-mail are gathered into a centralized function. Because so much internal event loss data is gathered at the individual personnel level, these institutions also need to have means to ensure that personnel comply with the policies and procedures for aggregating this event data. 3 Basel II, Paragraph 644. 4 Id. at footnote 97. 5 Basel II, Paragraph 673. Page 3

Disclosure Policies, Internal Controls, and Assessment Processes The third key to information security compliance with Basel II is adoption of a set of disclosure policies for proprietary and confidential information, internal controls over the disclosure processes and a process for assessing the appropriateness of disclosures. Each element of this key is explained below. Basel II requires the institution to adopt a formal disclosure policy for proprietary and confidential information that is approved by the institution s Board of Directors. As noted above, the kind of proprietary and confidential information that must be covered by the policy includes not only customer data, but also any information on the institution s products and systems that, if shared with a competitor, would render the institution s investment in such products and systems less valuable. It therefore applies to a great deal of business development and business intelligence data that would otherwise not be covered by other existing laws and regulations. The policy must specifically address what kinds of disclosures the institution will make. As noted above, the policy must address internal controls over disclosure of such information. Although Basel II provides little detail about these internal controls, it would be prudent for institutions to ensure that they include the means to detect and track authorized and unauthorized disclosure of information, to track which personnel have made the disclosure and whether the disclosure occurred in accordance with the institution s disclosure policy. To ensure compliance with the disclosure policy, Basel II also requires the institution to adopt a process for assessing the appropriateness of disclosures. This process must enable the institution to examine validation and frequency of disclosures. Because most of the proprietary and confidential data of institutions is now created, transmitted, and stored electronically, this element of Basel II also has significant information security ramifications. Institutions need to be able to create application and system level IT controls over disclosure processes. The ability to detect changes to these controls, and to generate an audit trail of disclosures is crucial to the ability of an institution to assess the appropriateness of disclosures. The ability to detect unauthorized changes to disclosure controls and track these changes back to individual personnel will enable institutions to monitor personnel compliance (or noncompliance) with the disclosure policy. Basel II Deadlines and Transition Periods Because Basel II is an international standard (not a law or regulation), there is technically no hard deadline for compliance except those deadlines imposed by national implementing legislation. BSC has recommended that the non-advanced (Basic Indicator and Standardized Approach) approaches to credit and operational risk be in place by the end of 2006, and run parallel with current national legislation or regulation until final national legislation or regulation implementing Basel II is passed. Because each nation can set its own deadline (US regulators, for example, have suggested the end of 2008), institutions will have some time to transition into the final requirements. Given the comprehensive scope of Basel II, however, institutions may need every day of this transition period to become prepared for compliance. Basel II Requirements and the Role of Change Management Although change management is not mentioned by name in Basel II, change management processes are crucial to compliance. The role of change management in general is to ensure that: All changes are authorized All changes are auditable All unauthorized changes are investigated Institutions cannot mitigate Operational Risk, track and centralize loss event data or be sure that their internal controls over disclosure processes are working if they cannot be sure that the systems and processes that support them are protected from unauthorized changes. The ability to audit changes to these systems can help support compliance, and the ability to investigate unauthorized change can both protect the institution from external events and legal risk and allow the institution to track whether personnel are following risk mitigation, event loss data and disclosure policies and procedures. Page 4

How Tripwire Helps Companies Achieve Basel II Compliance The need for automated systems and processes to support change management is critical to meet the Basel II requirements. Tripwire can help institutions meet all three of the information security keys to Basel II compliance. To support institutions mitigation efforts for Operational Risk, Tripwire s products can detect changes or unauthorized activity in internal processes and systems that stem from internal failure or inadequacy. Tripwire software can also detect unauthorized changes to systems from external events such as exploits and phishing, and can support compliance efforts with other laws and regulations that apply to the institution (such GLBA, the EU Data Protection Directive, and so forth) to help mitigate legal risk. Tripwire s ability to restore systems to a previously known compliant state if unauthorized changes occur ensures that downtime from Operational Risk is limited to a minimum. Tripwire s solutions can also enable institutions to detect and control changes in the tracking and centralizing of loss event data. This ability to detect unauthorized changes in the systems that support tracking and centralization of loss event data ensures that personnel comply with policies for tracking and centralizing loss event data, and do not try to use these policies for purposes outside what they were intended for by diverting less favorable data. If unauthorized changes are made to these systems, Tripwire can restore them to their previous compliant state and avoid major interruptions in the tracking and centralizing process. Tripwire is also uniquely suited to helping institutions enforce compliance with disclosure policies for proprietary and confidential information. Tripwire can detect changes to internal controls over the disclosure process, and ensure compliance with policies for disclosure by tracking personnel who make changes to systems that support and track the disclosure process without adequate authorization. Perhaps most importantly, Tripwire automatically generates a detailed audit trail to support the assessment process over the appropriateness of disclosures, including the examination of validation and frequency. The bottom line is that Tripwire enables change control across the entire IT infrastructure. With Tripwire, nothing can change without the organization s knowledge, and if security is compromised, the institution can quickly roll back to a known, compliant state on its IT systems including directory servers, file servers, desktops, databases, middleware applications and a broad range of network devices. Tripwire software monitors servers and network devices for file integrity, and promptly reports any deviation or change to responsible personnel. With Tripwire, financial institutions can easily meet requirements for Basel II compliance, and gain the business benefits of increased data security, easier overall regulatory compliance, and improved IT service reliability. Page 5

Basel II Requirements and Tripwire solutions Tripwire solutions help institutions comply with multiple requirements of Basel II, especially those in the realm of Mitigating Operational Risk under Pillar 2: Pillar & Key Number Requirement(s) Tripwire Directly Responds Tripwire Supports Pillar 2 (Mitigating Operational Risk) 663 & 666 Adopting function to identify, assess, monitor and control/ mitigate operational risk including legal risk Systematic tracking of relevant operational risk data Regular reporting of operational risk exposures & losses to senior mgmt and board of directors Procedures for taking appropriate action in response to exposures and losses Ensuring compliance with internal policies, controls and procedures for operational risk mitigation Regular independent review and validation of operational risk mgmt processes and assessment system Regular auditing of operational risk mgmt processes and assessment system Pillar 2 (Tracking and centralizing event loss data) 670 671 Tracking internal loss data Documenting procedures for assessing relevance of historical loss data and applying judgment overrides or other adjustments (incl. who is authorized to apply them) 673 Adopting specific criteria for assigning loss event data into a centralized function such as IT Pillar 3 (Disclosure Policies, Internal Controls & Assessment Processes) 819 & 821 821 821 Adopting a formal disclosure policy for proprietary and confidential information that is approved by the institution s Board of Directors Addressing internal controls over disclosure of such information Adopting processes for assessing the appropriateness of disclosures that enables institution to examine validation & frequency of disclosures Page 6

Other Resources Many sources of valuable materials and informative guides on Basel II and developing change management processes exist. Below are links to corporate governance guides, best practices for audit committees and IT organizations, and many other resources that will help companies understand compliance, service quality, and security requirements. Basel II: International Convergence of Capital Measurement and Capital Standards: a Revised Framework (June 2006) www.bis.org/publ/bcbs128.pdf U.S. Implementation of the Basel II Capital Accord: This Web page from the Federal Reserve Board provides resources to documents relating to the U.S. implementation of Basel II. www.federalreserve.gov/generalinfo/basel2/ U.S. Implementation of the Basel II Capital Accord: This Web page from the Federal Reserve Board provides resources to documents relating to the U.S. implementation of Basel II. www.federalreserve.gov/generalinfo/basel2/ Change and Patch Management Controls: Critical for Organizational Success; This guide will give readers the necessary knowledge to help them counsel their boards about change management risks and controls, and to help their organizations comply with constantly changing regulatory requirements. www.theiia.org/index.cfm?doc_id=5167 Information Technology Controls: Covers technology topics, issues, and audit concerns as well as issues surrounding management, security, control, assurance, and risk management. www.theiia.org/index.cfm?doc_id=5166 The Visible Ops Handbook: Visible Ops illustrates how interested organizations might replicate key processes of high-performing organizations in just four steps. www.itpi.org/home/visibleops2.php About the Author Daniel J. Langin is the principal of Daniel J. Langin, Attorney at Law, LLC. He has over 17 years of experience in private and corporate practice, including ten years of experience in technology, insurance coverage and intellectual property litigation and counseling. For more information, see www.langinlaw.com or contact Daniel at (913) 661-2430 or dlangin@langinlaw.com. This article is provided for general educational and informational purposes. It is not intended to provide legal advice. www.tripwire.com www.tripwire.com/europe US TOLL FREE: 1.800.TRIPWIRE MAIN: 503.276.7500 FA: 503.223.0182 TRIPWIRE UK: +44 207 618 6512 FA: +44 207 618 8001 326 SW Broadway, 3rd Floor Portland, OR 97205 USA 78 Cannon Street London EC4N 6NQ UK Page 7 WPBSL2